Abstract
Cloud computing [1] is the most upcoming area of the IT industry that helps the users to get rid of the hardware resources and complexity in storage and computational power. All the people started using cloud which led to many security concerns relating to the data confidentiality and integrity. This became a challenge to the widespread of the new cloud computing technology. Many measures are taken to improve the cloud security and then there came the concept of cryptography to upgrade the cloud security. Today, the main problem is to sustain data privacy [2] against unreliable cloud service providers and to provide correct query results to the authenticated users. Existing approach provide confidentiality using only one symmetric encryption algorithm which generates only one secret key to both encrypt and decrypt. But this is not so secured as the attacker can easily guess the algorithm and thereby find the key. In this journal, we proposed a randomized encryption technique in which the files are randomly encrypted by three strong algorithms AES, Triple DES and Blowfish [3] which improves the security and we are also implementing new techniques to improve security like key generation via OTP method, etc. In addition to this, we are also going to solve the storage issue of redundant or duplicate files consuming the cloud storage by using a file-level de-duplication technique which can eliminate the duplication of files uploaded into the cloud, thereby saving storage and reduce the need to buy extra storage.
Highlights
Improper credential managementWhen the information of all the users of the cloud is not properly stored [13], the attackers can acts as the legitimate users, enter into the system and access, modify or delete files which may cause potential harm to the organization
Introduction the Cloud SecurityRedundant storage of files is important storage issues of Cloud Computing which consume a lot of disk space
This can be eliminated by the concept of de-duplication that does not In the present scenario, Cloud Computing is one of the latest allow duplicate files to be stored repeatedly in the cloud. emerging areas of the IT Infrastructure with most powerful network and storage facilities which are being used by almost all the users across the world
Summary
When the information of all the users of the cloud is not properly stored [13], the attackers can acts as the legitimate users, enter into the system and access, modify or delete files which may cause potential harm to the organization
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering & Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.